As the COVID-19 pandemic has evolved, a patchwork of well-intentioned, state-level restrictions has emerged. They have impeded interstate commerce and the rapid delivery of critical food, medical and sanitation supplies. As truckers work to move products throughout the country, they are often confronted with closed rest areas, local curfews, and in some cases, 14-day quarantines. INL researchers developed a web application to visually display route restrictions, alternative routes and other pertinent information pulled from publicly available sources, including state websites and databases.

Global risk management experts are calling for fire education initiatives to be included in driver safety programs so that drivers are better prepared for an emergency if faced with it on the roads. Researchers assessed fire safety mechanisms of road tunnels, finding that risks to human life could be reduced through greater awareness and education.

As long as humans have been moving, there have been fantastic predictions about how technology will revolutionize transportation. Most of them turn out to be myths. A new study revisits an influential article that called out widely held transportation predictions of 20 years ago as myths, finding it is still highly accurate.

A major experiment introducing proactive policing to London Underground platforms finds that short bursts of patrolling create a “phantom effect”: 97 percent of the resulting crime reduction was during periods when police were not actually present.

The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.

In the near future connected and autonomous vehicles (CAVs) are expected to become widely used across the world. Researchers have been working to improve the security, privacy and safety of CAVs by testing four innovations in the IoT-enabled Transport and Mobility Demonstrator. They were able to connect CAVs to other CAVs and roadside infrastructure more securely and privately.CAVs can now connect to each other, roadside infrastructure, and roadside infrastructure to each other more securely.

A new study of the environmental sustainability impacts of flying cars, formally known as electric vertical takeoff and landing aircraft, or VTOLs, finds that they wouldn’t be suitable for a short commute. However, VTOLs—which combine the convenience of vertical takeoff and landing like a helicopter with the efficient aerodynamic flight of an airplane—could play a niche role in sustainable mobility for longer trips.

Snow and ice can dramatically change the conditions of a road, where slippery surfaces make it harder to keep control of a vehicle, particularly when braking or turning. Under-road heating that melts ice and snow within 15 minutes and real-time information about icy road conditions could help prevent wintertime accidents.

In 2016, there were more than 7 million police-reported traffic crashes in which 37,461 people were killed and an estimated 3,144,000 were injured. Idling in a long highway line of slowed or stopped traffic on a busy highway can be more than an inconvenience for drivers and highway safety officers. It is one of the most vulnerable times for “secondary accidents,” which often can be worse than an original source of the slowdown.

In acts of terrorism, vehicles have been deployed as killing machines. These incidents involved human operators, but another sinister possibility looms: a vehicle cyber hack intended to cause human harm. While this kind of terrorist attack has not yet occurred, in the realm of security research, it’s been demonstrated how hackers could gain control over car systems like the brakes, steering and engine.

Connected cars could be as vulnerable to cyberattack as the smartphone in your hand or the personal computer on your desktop, according to a new study from the U.K.“Connected cars are no different from other nodes on the internet of things and face many of the same generic cybersecurity threats,” the team reports.

To enable public transit agencies to engage in more rigorous and effective safety planning, their safety planning records should not be admissible as evidence in civil litigation, says a new report from the National Academies of Sciences. State highway agencies and commuter railroads have been granted such “evidentiary protections,” and the report found no compelling reason to advise Congress against current practice by treating transit agencies differently.

Only a week after the terrorist attacks of September 11, 2001, envelopes containing anthrax spores were sent to several media companies and two senators. As a result, twenty-two people were infected and five died. Since these incidents, the U.S. has increased its efforts on measures countering bioterrorism. That incident stemmed from spores sent to individuals and offices where the reach was somewhat contained. Imagine if the spores had been taken onto a mass transit platform — like the subway. A subway incident can bring a whole city to a halt, and the effects can last much longer in the form of lingering fear and mistrust.

Rail transport is undergoing a huge transformation thanks to automated, wireless and connected technologies that whoosh passengers down the tracks faster and more efficiently than ever before possible. However, these same technologies have opened a door to new types of cyber-attacks that can threaten passenger safety, disrupt service and cause serious economic damage. A new startup has raised $4.7 million in seed money to develop its proactive solution to protect railways and metros.

Everyone wants to be safe and secure, but can you imagine if you had to go through a security screening at the metro station like there is at the airport? What if there were a way to safely scan crowds for potential threat items in places like metro and train stations without security officials coming into direct contact with the public and while maintaining individual privacy?